/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/ |
H A D | FakeStorageManager.java | 35 public void addUserKeyAuth(int userId, int serialNumber, byte[] token, byte[] secret) { argument 36 getUserAuth(userId).add(new Pair<>(token, secret)); 58 throw new AssertionFailedError("More than one secret exists"); 63 public void unlockUser(int userId, byte[] secret, IProgressListener listener) argument 68 if (secret != null) { 70 throw new AssertionFailedError("More than one secret exists"); 73 if ((!mIgnoreBadUnlock) && auth.second != null && !Arrays.equals(secret, auth.second)) { 74 throw new AssertionFailedError("Invalid secret to unlock user");
|
H A D | CachedSyntheticPasswordTests.java | 110 // Ensure the same secret was passed each time 111 ArgumentCaptor<ArrayList<Byte>> secret = ArgumentCaptor.forClass(ArrayList.class); 112 verify(mAuthSecretService, atLeastOnce()).primaryUserCredential(secret.capture()); 113 assertEquals(1, secret.getAllValues().stream().distinct().count());
|
H A D | SyntheticPasswordTests.java | 191 // Check the same secret was passed each time 192 ArgumentCaptor<ArrayList<Byte>> secret = ArgumentCaptor.forClass(ArrayList.class); 193 verify(mAuthSecretService, atLeastOnce()).primaryUserCredential(secret.capture()); 194 assertEquals(1, secret.getAllValues().stream().distinct().count());
|
/frameworks/base/core/java/android/security/keystore/recovery/ |
H A D | KeyChainProtectionParams.java | 76 * Lockscreen secret is required to recover KeyStore. 111 private byte[] mSecret; // Derived from user secret. The field must have limited visibility. 148 * @return secret or empty array 161 * Sets user secret type. 165 * @param userSecretType The secret type 202 * @param secret The secret. 205 public Builder setSecret(@NonNull byte[] secret) { argument 206 mInstance.mSecret = secret; 233 * Fills secret wit [all...] |
/frameworks/base/core/java/android/os/storage/ |
H A D | IStorageManager.aidl | 173 void unlockUserKey(int userId, int serialNumber, in byte[] token, in byte[] secret) = 63; 179 void addUserKeyAuth(int userId, int serialNumber, in byte[] token, in byte[] secret) = 70;
|
H A D | StorageManager.java | 567 * @param key secret used to encrypt the OBB; may be <code>null</code> if no 1296 public void unlockUserKey(int userId, int serialNumber, byte[] token, byte[] secret) { argument 1298 mStorageManager.unlockUserKey(userId, serialNumber, token, secret);
|
/frameworks/base/services/core/java/com/android/server/locksettings/ |
H A D | SyntheticPasswordManager.java | 183 public void recreate(byte[] secret) { argument 184 initialize(secret, this.P1); 329 * a default all-zero key is used. If the value is not specified, a fresh random secret is 358 * the verification is successful, throttled or failed. If successful, the bound secret 783 Log.e(TAG, "Failed to enroll weaver secret when activating token", e); 797 final byte[] secret; 799 secret = authToken.computeP0(); 801 secret = authToken.syntheticPassword.getBytes(); 803 byte[] content = createSPBlob(getHandleName(handle), secret, applicationId, sid); 913 Log.e(TAG, "Failed to retrieve weaver secret whe 1044 transformUnderWeaverSecret(byte[] data, byte[] secret) argument [all...] |
H A D | LockSettingsService.java | 588 // If the user doesn't have a credential, try and derive their secret for the 589 // AuthSecret HAL. The secret will have been enrolled if the user previously set a 1153 private void unlockUser(int userId, byte[] token, byte[] secret) { argument 1175 mActivityManager.unlockUser(userId, token, secret, listener); 1384 // push new secret and auth token to vold 1536 private void addUserKeyAuth(int userId, byte[] token, byte[] secret) argument 1542 storageManager.addUserKeyAuth(userId, userInfo.serialNumber, token, secret); 1755 // FBE keys, so just pass through a fake token/secret 2190 // Pass the primary user's auth secret to the HAL 2194 final ArrayList<Byte> secret [all...] |
/frameworks/base/services/core/java/com/android/server/locksettings/recoverablekeystore/ |
H A D | SecureBox.java | 62 * <li>A secret shared between the sender and the recipient, or 63 * <li>Both a recipient's public key and a shared secret. 164 * only with the shared secret 165 * @param sharedSecret the secret shared between the sender and the recipient, or null if the 183 throw new IllegalArgumentException("Both the public key and shared secret are empty"); 223 * with the shared secret 224 * @param sharedSecret the secret shared between the sender and the recipient, or null if the 244 throw new IllegalArgumentException("Both the private key and shared secret are empty"); 301 private static SecretKey hkdfDeriveKey(byte[] secret, byte[] salt, byte[] info) argument 310 byte[] pseudorandomKey = mac.doFinal(secret); [all...] |
/frameworks/base/services/core/java/com/android/server/am/ |
H A D | UserController.java | 1109 boolean unlockUser(final int userId, byte[] token, byte[] secret, IProgressListener listener) { argument 1122 return unlockUserCleared(userId, token, secret, listener); 1147 private boolean unlockUserCleared(final int userId, byte[] token, byte[] secret, argument 1155 storageManager.unlockUserKey(userId, userInfo.serialNumber, token, secret);
|
H A D | ActivityManagerShellCommand.java | 1684 byte[] secret = argToBytes(getNextArgRequired()); 1685 boolean success = mInterface.unlockUser(userId, token, secret, null);
|
H A D | ActivityManagerService.java | 26118 unlockUser(int userId, byte[] token, byte[] secret, IProgressListener listener) argument [all...] |
/frameworks/base/services/core/java/com/android/server/ |
H A D | StorageManagerService.java | 2490 * Add this token/secret pair to the set of ways we can recover a disk encryption key. 2491 * Changing the token/secret for a disk encryption key is done in two phases: first, adding 2492 * a new token/secret pair with this call, then delting all other pairs with 2497 public void addUserKeyAuth(int userId, int serialNumber, byte[] token, byte[] secret) { argument 2501 mVold.addUserKeyAuth(userId, serialNumber, encodeBytes(token), encodeBytes(secret)); 2508 * Delete all disk encryption token/secret pairs except the most recently added one 2522 public void unlockUserKey(int userId, int serialNumber, byte[] token, byte[] secret) { argument 2526 // When a user has secure lock screen, require secret to actually unlock. 2528 if (mLockPatternUtils.isSecure(userId) && ArrayUtils.isEmpty(secret)) { 2534 encodeBytes(secret)); [all...] |
/frameworks/base/core/java/android/app/ |
H A D | IActivityManager.aidl | 546 boolean unlockUser(int userid, in byte[] token, in byte[] secret,
|